Researchers Find Hundreds of Apps Secretly Capture User Data

Oct 26, 2015 By: Jeff Matsuura

Researchers recently reported that more than 250 apps currently distributed through the Apple Apps Store secretly transmit information about individual users and their devices to other parties.

Legal Implications of “Hidden” Computer Code

Oct 19, 2015 By: Craig Blakeley

A criminal case working its way through the California court system highlights the challenges associated with oversight of the operations of proprietary computer code.

Michigan’s Decade-Long IT Contracting Nightmare

Oct 5, 2015 By: Jeff Matsuura

The State of Michigan recently terminated an information technology contract with Hewlett-Packard and sued the company in court in Michigan.

Is the Volkswagen Emission Scandal a Computer Crime?

Sep 28, 2015 By: Jeff Matsuura

It seems that Volkswagen’s actions regarding the emissions in several models of its vehicles should qualify as computer crimes.

The NFL and Data Mining: A Case Study in the Opportunities and Challenges of Big Data

Sep 21, 2015 By: Craig Blakeley

As an active data miner, the NFL must now address many of the same legal and public policy issues associated with extensive data collection and use faced by those other industries.

Court Ruling Threatens Status of 50,000 Tech Visa Holders

Sep 14, 2015 By: Jeff Matsuura

An August 12, 2015 ruling of the federal district court in the District of Columbia could result in the loss of up to 50,000 visas currently held by foreign-born workers in the American technology industry.

“Beatlemania” Rocks Canadian Copyright Law

Sep 8, 2015 By: Craig Blakeley

Until recently, Canadian copyright law applied a fifty year term for works music recordings. It was amended to block the lapse of several major artists’ recordings into the public domain.

Advertising Injection: Another Source of Online Legal Controversy

Aug 31, 2015 By: Craig Blakeley

Observers note that some Wi-Fi “hotspot” operators now use “advertising injection” systems to introduce ads into online content accessed through use of the hotspots.

NSA’s EINSTEIN Surveillance Software: A Double-Edged Sword

Aug 24, 2015 By: Jeff Matsuura

EINSTEIN shows us that there is a high price to be paid for computer security.

Yet Another Data Security Challenge: Protection of Biometric Data

Aug 17, 2015 By: Craig Blakeley

All parties involved in use of biometric data must recognize that they face substantial potential legal liability as a result of the highly sensitive nature of the data, and they should structure their security strategies, policies, and practices accordingly.